Migrating Policies Manually Use Fusion Middleware Control to deploy the application EAR file to the
6.5.2.2 Migrating Credentials Manually
The script migrateSecurityStore recreates GUIDs and may take a long time to migrate large volume of credentials; for these reasons, during the transition from a test to a production environment, you may want to consider migrating policies and credentials with an alternate procedure that uses Oracle Internet Directory bulk operations. For details, see Migrating Large Volume Policy and Credential Stores . Migrating credentials manually with migrateSecurityStore requires assembling a configuration file where the source and destination are specified. Since migrateSecurityStore recreates GUIDs and takes a long time to migrate large volume of data, you may want to consider migrating stores with an alternate procedure that uses Oracle Internet Directory bulk operations. For details, see Migrating Large Volume Policy and Credential Stores . Here is a complete sample of a configuration file, named t2p-credentials.xml, illustrating the specification of credential sources in LDAP, DB, and XML storages, and of credential destinations in LDAP or DB storages: ?xml version=1.0 encoding=UTF-8 standalone=yes? jpsConfig xmlns=http:xmlns.oracle.comoracleasschema11jps-config-11_1.xsd xmlns:xsi=http:www.w3.org2001XMLSchema-instance xsi:schemaLocation=http:xmlns.oracle.comoracleasschema11jps-config-11_ 1.xsd schema-major-version=11 schema-minor-version=1 serviceProviders serviceProvider class=oracle.security.jps.internal.credstore.ssp.SspCredentialStoreProvider name=credstoressp type=CREDENTIAL_STORE descriptionFile-based credential providerdescription serviceProvider serviceProvider class=oracle.security.jps.internal.credstore.ldap.LdapCredentialStoreProvider name=ldap.credentialstore.provider type=CREDENTIAL_STORE descriptionLDAP-based credential providerdescription serviceProvider serviceProvider class=oracle.security.jps.internal.credstore.rdbms.DbmsCredentialStoreProvider name=db.credentialstore.provider type=CREDENTIAL_STORE descriptionDB-based credential providerdescription serviceProvider serviceProviders serviceInstances -- Source file-based credential store instance -- serviceInstance location=myFileBasedCredStoreLocation provider=credstoressp name=credential.file.source descriptionReplace location with the full path of the folder where the file-based source credential store cwallet.sso is located in the source file system; typically located in sourceDomainconfigfmwconfig description serviceInstance -- Source LDAP-based credential store instance -- serviceInstance provider=ldap.credentialstore.provider name=credential.ldap.source descriptionReplace: A. mySourceDomain and mySourceRootName to appropriate 6-16 Oracle Fusion Middleware Application Security Guide values according to your source LDAP directory structure; B. ldap:mySourceHost.com:3060 with the URL and port number of your source LDAPdescription property value=bootstrap name=bootstrap.security.credential.key property value=cn=mySourceDomain name=oracle.security.jps.farm.name property value=cn=mySourceRootName name=oracle.security.jps.ldap.root.name property value=ldap:mySourceHost.com:3060 name=ldap.url serviceInstance -- Source DB-based credential store instance -- serviceInstance provider=db.credentialstore.provider name=credential.db.source descriptionReplace: A. mySourceDomain and mySourceRootName to appropriate values according to your source DB credential storedescription property value=cn=mySourceDomain name=oracle.security.jps.farm.name property value=cn=mySourceRootName name=oracle.security.jps.ldap.root.name property value=jdbc:oracle:thin:mySourceHost:1722:orcl name=jdbc.url -- the value of jdbc.url should be the value entered when the source datasource was set up -- property value=oracle.jdbc.driver.OracleDriver name=jdbc.driver property name=bootstrap.security.principal.key value=mySourceKeyName property name=bootstrap.security.principal.map value=mySourceMapName -- the values of bootstrap.security.principal.key and bootstratp.security.principal.map should be the values entered when the bootstrap credential was set up -- serviceInstance -- Destination LDAP-based credential store instance -- serviceInstance provider=ldap.credentialstore.provider name=credential.ldap.destination descriptionReplace: A. myDestDomain and myDestRootName to appropriate values according to your destination LDAP directory structure; B. ldap:myDestHost.com:3060 with the URL and port number of your destination LDAPdescription property value=bootstrap name=bootstrap.security.credential.key property value=cn=myDestDomain name=oracle.security.jps.farm.name property value=cn=myDestRootName name=oracle.security.jps.ldap.root.name property value=ldap:myDestHost.com:3060 name=ldap.url serviceInstance -- Destination DB-based credential store instance -- serviceInstance provider=db.credentialstore.provider name=credential.db.destination descriptionReplace: myDestDomain and myDestRootName to appropriate values according to your destination DB credential storedescription property value=cn=myDestDomain name=oracle.security.jps.farm.name property value=cn=myDestRootName name=oracle.security.jps.ldap.root.name property value=jdbc:oracle:thin:myDestHost.com:1722:orcl name=jdbc.url -- the value of jdbc.url should be the value entered when the destination datasource was set up -- property value=oracle.jdbc.driver.OracleDriver name=jdbc.driver property name=bootstrap.security.principal.key value=myDestKeyName property name=bootstrap.security.principal.map value=myDestMapName -- the values of bootstrap.security.principal.key and bootstratp.security.principal.map should be the values entered when the bootstrap credential was set up -- serviceInstance -- Bootstrap credentials to access source and destination LDAPs and DBs -- Deploying Secure Applications 6-17 serviceInstance location=.bootstrap provider=credstoressp name=bootstrap.cred descriptionReplace location with the full path of the directory where the bootstrap file cwallet.sso is located; typically found in destinationDomain configfmwconfigdescription serviceInstance serviceInstances jpsContexts jpsContext name=FileSourceContext serviceInstanceRef ref=credential.file.source jpsContext jpsContext name=LDAPsourceContext serviceInstanceRef ref=credential.ldap.source jpsContext jpsContext name=DBsourceContext serviceInstanceRef ref=credential.db.source jpsContext jpsContext name=LDAPdestinationContext serviceInstanceRef ref=credential.ldap.destination jpsContext jpsContext name=DBdestinationContext serviceInstanceRef ref=credential.db.destination jpsContext -- Do not change the name of the next context -- jpsContext name=bootstrap_credstore_context serviceInstanceRef ref=bootstrap.cred jpsContext jpsContexts jpsConfig Note that since the migration involves LDAP andor DB stores, the file includes a jps-context named bootstrap_credstore_context that specifies the directory where the bootstrap credential file cwallet.sso is located. The following examples of use of migrateSecurityStore assume that the file t2p-credentials.xml is located on the target system in the directory where the script is run. Under that assumption, to migrate credentials from a test or source LDAP store to a production or destination LDAP store, invoke migrateSecurityStore in the target system as follows: migrateSecurityStoretype=credStore,configFile=t2p-credentials.xml,src=LDAPs ourceContext,dst=LDAPdestinationContext To migrate credentials from a test or source XML store to a production or destination LDAP store, invoke migrateSecurityStore in the target system as follows: migrateSecurityStoretype=credStore,configFile=t2p-credentials.xml,src=FileS ourceContext,dst=LDAPdestinationContext To migrate credentials from a test or source DB store to a production or destination DB store, invoke migrateSecurityStore in the target system as follows: migrateSecurityStoretype=credStore,configFile=t2p-credentials.xml,src=DBSou 6-18 Oracle Fusion Middleware Application Security Guide rceContext,dst=DBdestinationContext6.5.2.3 Migrating Large Volume Policy and Credential Stores
Migrating stores with the alternate procedure explained in this section is suitable to preserve source GUIDs or for large volume stores where migrating with the script migrateSecurityStore would take an unacceptable amount of time. For illustration purpose, assume that the policy store LDAP to be migrated is configured in the file jps-config.xml with a service instance as in the following fragment: serviceInstance provider=ldap.policystore.provider name=policystore.ldap property name=policystore.type value=OID property name=bootstrap.security.principal value=bootstrap property name=oracle.security.jps.farm.name value=cn=base_domain property name=oracle.security.jps.ldap.root.name value=cn=mySrcRootName property name=ldap.url value=ldap:myCompany.com:7766 serviceInstance To migrate a source Oracle Internet Directory store to a destination Oracle Internet Directory store using bulk commands, proceed as follows: 1. In the system where the source Oracle Internet Directory is located, produce an LDIF file by running ldifwrite as illustrated in the following line: ldifwrite connect=srcOidDbConnectStr baseDN=cn=jpsnode, c=us ldiffile=srcOid.ldif This command writes all entries under the node cn=jpsnode, c=us to the file srcOid.ldif. Once generated, move this file, as appropriate, to the destination Oracle Internet Directory file system so it is available to the commands that follow. 2. In the destination Oracle Internet Directory node, ensure that the JPS schema has been seeded. 3. In the destination Oracle Internet Directory system, verify that there are no schema errors or bad entries by running bulkload as illustrated in the following line: bulkload connect=dstOidDbConnectStr check=true generate=true restore=true file=fullPath2SrcOidLdif If duplicated DNs common entries between the source and destination directories are detected, review them to prevent unexpected results. 4. Backup the destination DB. If the next steps fails and corrupts the DB, the DB must be restored. Note: Large volume migration of stores is supported for LDAP-based stores only. It is not supported for DB-based stores. Important: If you intend to use the procedure that follows with a destination Oracle Internet Directory version 10.1.4.3.0, then you must first apply a patch for bug number 8417224. To download this patch for your platform, visit Oracle Support at http:myoraclesupport.oracle.com . Deploying Secure Applications 6-19 5. Load data into the destination Oracle Internet Directory, by running bulkload as illustrated in the following line: bulkload connect=dstOidDbConnectStr load=true file=fullPath2SrcOidLdif For details about the above commands, see chapter 14, Performing Bulk Operations, in Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory.6.5.3 Migrating Audit Policies
To migrate audit policies, use the export and import operations as explained next. First, export the audit configuration from a test environment to a file using one of the following tools: ■ Fusion Middleware Control: navigate to Domain Security Audit Policy, and then click Export. ■ The OPSS script exportAuditConfig. For details, see Appendix C.4.7, exportAuditConfig. Then, import that file into the production environment using one of the following tools: ■ Fusion Middleware Control: navigate to Domain Security Audit Policy, and then click Import. ■ The OPSS script importAuditConfig. For details, see Appendix C.4.8, importAuditConfig. The importexport operations above migrate audit policies only, and they do not migrate the audit data store settings. If you had configured an audit data source in your test environment, repeat the steps to configure a data source in the production environment. For details, see Section 12.2.2, Set Up Audit Data Sources. Normally, you would not want audit data records from a test environment to be migrated to production; however, to do so, use the database importexport utilities for that purpose. For details, see Section 12.5.5, Importing and Exporting Data.Parts
» Oracle Fusion Middleware Online Documentation Library
» OPSS Main Features What is Oracle Platform Security Services?
» Supported Server Platforms What is Oracle Platform Security Services?
» Scenario 3: Securing a Java SE Application
» Oracle ADF Security Overview OPSS for Administrators Terminology
» Permission Inheritance and the Role Hierarchy
» The Authenticated Role Oracle Fusion Middleware Online Documentation Library
» Administrative Users and Roles Managing User Accounts The Role Category
» Supported LDAP Identity Store Types
» Oracle WebLogic Authenticators Authentication Basics
» Policy Store Basics Oracle Fusion Middleware Online Documentation Library
» Credential Store Basics Oracle Fusion Middleware Online Documentation Library
» Supported LDAP-, DB-, and File-Based Services
» Management Tools Oracle Fusion Middleware Online Documentation Library
» Packaging Requirements Example Scenarios
» Other Scenarios Oracle Fusion Middleware Online Documentation Library
» Choosing the Administration Tool According to Technology
» Setting Up a Brand New Production Environment
» Typical Security Practices with Typical Security Practices with the Administration Console
» Overview Oracle Fusion Middleware Online Documentation Library
» Deploying Java EE and Oracle ADF Applications with Fusion Middleware Control
» Deploying to a Test Environment
» Deploying Standard Java EE Applications
» Migrating Providers other than Policy and Credential Providers
» Migrating Large Volume Policy and Credential Stores
» Migrating Audit Policies Migrating from a Test to a Production Environment
» About the Identity Store Service
» Service Architecture Introduction to the Identity Store Service
» Configuring the Identity Store Provider
» What is Configured? Configuring the Identity Store Service
» Configuring the Service for Multiple LDAP using WLST Configuring Other Parameters
» Configuring Split Profiles Configuration in Other Application Servers
» Java SE Environments Configuring the Identity Store Service
» Querying the Identity Store Programmatically
» Introduction to the OPSS Security Store
» Multiple-Node Server Environments Using an LDAP-Based OPSS Security Store
» Prerequisites to Using an LDAP-Based Security Store
» Dropping the OPSS Schema in an Oracle Database
» In that dialog, select the prefix and, in the Component hierarchy, check AS
» Creating a Data Source Instance
» Maintaining a DB-Based Security Store
» Connecting to a DB Server with sqlplus or JDBC OCI Driver This task involves
» Navigate to Data Sources YourDataSourceName Custom Properties.
» Configuring the OPSS Security Store
» Log in to Fusion Middleware Control and navigate to Domain Security
» Click the button Change Association to display the Set Security Provider page,
» If you have selected Database, enter the name of the data source in the Datasource
» Optionally, check the box Use SSL to Connect to establish an anonymous SSL
» In the text box Connect DN, enter the full distinguished name, a string
» In the box Password, enter the user password, also a string containing
» In the Root Node Details area, enter the root DN in the box Root DN, which
» Optionally, in the Policy Store Properties and Credential Store Properties areas,
» Setting Up a One- Way SSL Connection
» Securing Access to Oracle Internet Directory Nodes
» Reassociating with the Script reassociateSecurityStore
» Migrating with Fusion Middleware Control
» Migrating with the Script migrateSecurityStore
» Use the button Delete to remove a selected item from any table. When finished
» Cataloging Oracle Internet Directory Attributes
» To display roles in an application, expand the Search area, choose the application
» To create an application role, click Create to display the Create Application Role
» Click Add Application Role, to display the Add Application Role dialog.
» Select roles from the box Available Roles, as appropriate, and use the buttons
» Click Add Group, to display the Add Group dialog.
» Select groups from the box Available Groups, as appropriate, and use the
» Click Add User, to display the Add User dialog.
» Select users from the box Available Users, as appropriate, and use the buttons
» Click Create Like, to display the Create Application Role Like page. Notice
» Modify the list of roles and users, as appropriate, and then click OK.
» Log in to Fusion Middleware Control and navigate to Domain Security System
» listAppStripes Managing Application Policies with OPSS Scripts
» createAppRole Managing Application Policies with OPSS Scripts
» deleteAppRole grantAppRole Managing Application Policies with OPSS Scripts
» revokeAppRole listAppRoles Managing Application Policies with OPSS Scripts
» listAppRolesMembers grantPermission Managing Application Policies with OPSS Scripts
» revokePermission Managing Application Policies with OPSS Scripts
» listPermissions Managing Application Policies with OPSS Scripts
» deleteAppPolicies createResourceType Managing Application Policies with OPSS Scripts
» getResourceType deleteResourceType Managing Application Policies with OPSS Scripts
» createResource Managing Application Policies with OPSS Scripts
» deleteResource listResources Managing Application Policies with OPSS Scripts
» listResourceActions createEntitlement Managing Application Policies with OPSS Scripts
» getEntitlement Managing Application Policies with OPSS Scripts
» deleteEntitlement Managing Application Policies with OPSS Scripts
» addResourceToEntitlement Managing Application Policies with OPSS Scripts
» revokeResourceFromEntitlement Managing Application Policies with OPSS Scripts
» listEntitlements Managing Application Policies with OPSS Scripts
» grantEntitlement Managing Application Policies with OPSS Scripts
» listResourceTypes reassociateSecurityStore Managing Application Policies with OPSS Scripts
» The user accesses the functionality secured by the application role.
» Granting Policies to Anonymous and Authenticated Roles with WLST Scripts
» Guidelines for Configuring the Policy Store
» Credential Types Managing the Credential Store
» Managing Credentials with Fusion Middleware Control
» listCred Managing Credentials with OPSS Scripts
» updateCred Managing Credentials with OPSS Scripts
» createCred Managing Credentials with OPSS Scripts
» deleteCred Managing Credentials with OPSS Scripts
» modifyBootStrapCredential Managing Credentials with OPSS Scripts
» addBootStrapCredential Managing Credentials with OPSS Scripts
» Objectives of Auditing Benefits and Features of the Oracle Fusion Middleware Audit Framework
» Oracle Fusion Middleware Audit Framework in 11g
» Audit Architecture Oracle Fusion Middleware Audit Framework Concepts
» Key Technical Concepts Oracle Fusion Middleware Audit Framework Concepts
» Audit Record Storage Analytics
» Audit Administration Tasks Oracle Fusion Middleware Online Documentation Library
» Choose Create at the starting screen. Click Next.
» Multiple Data Sources Enter the following details for the new data source:
» Open the opmn.xml file, which resides in
» Configuring the Stand-alone Audit Loader
» If you made any policy changes, click Apply to save the changes. For Java
» Click Select Failures Only to select only failed events in the policy - for example,
» ImportExport - These buttons enable you to save and re-use a policy
» Optionally, under “Users to Always Audit”, a comma-separated list of users can
» Manage Audit Policies Manually
» Audit Log Timestamps Audit Logs
» Schema Overview Advanced Management of Database Store
» Table Attributes Indexing Scheme Backup and Recovery
» Importing and Exporting Data Partitioning
» About Oracle Business Intelligence Publisher
» Install Oracle Business Intelligence Publisher
» Set Up Oracle Reports in Oracle Business Intelligence Publisher
» Configure Scheduler in Oracle Business Intelligence Publisher
» Organization of Audit Reports
» View Audit Reports Oracle Fusion Middleware Online Documentation Library
» Example of Oracle Business Intelligence Publisher Reports
» List of Audit Reports in Oracle Business Intelligence Publisher
» The condition is now included in the report. Be sure to click Save again on the
» Choosing the Right SSO Solution for Your Deployment
» About Using the Identity Asserter Function with Oracle Access Manager
» Choosing Applications for Oracle Access Manager SSO Scenarios and Solutions
» Implementation: Using the Provider with OAM 11g versus OAM 10g
» Requirements for the Provider with Oracle Access Manager
» Setting Up Debugging in the WebLogic Administration Console
» Previewing Pre-Seeded OAM 11g Policies for Use by the OAM 10g AccessGate
» Install and set up Oracle Internet Directory for Oracle Access Manager.
» Optional Installing the Authentication Provider with Oracle Access Manager 11g
» WebGate for Identity Asserter for Single Sign-On
» AccessGate for the Authenticator or for Oracle Web Services Manager
» Provision the agent. For example:
» Locate the remote registration script.
» No Oracle Fusion Middleware Application
» With Oracle Fusion Middleware Application Installed
» Click Security Realms, Default Realm Name, and click Providers.
» OAM Identity Asserter Configuring Identity Assertion for SSO with Oracle Access Manager 11g
» Click Lock Edit, if desired.
» OAM Authenticator Configuring the Authenticator Function for Oracle Access Manager 11g
» Click Security Realms and select the realm you want to configure.
» Select Providers, Authentication, and click New to display the Create a New
» Logout for 11g WebGate and OAM 11g
» Optional Logout for 10g WebGate with Oracle Access Manager 11g
» Synchronizing the User and SSO Sessions: SSO Synchronization Filter
» Troubleshooting Tips Oracle Fusion Middleware Online Documentation Library
» An Oracle Internet Directory or Oracle Sun One LDAP directory server configured
» Alternative Process for Configuring Logout
» Oracle Access Manager Authentication Provider Parameter List
» OAMCfgTool Parameters and Values
» Sample Policy Domain and AccessGate Profile Created with OAMCfgTool
» Known Issues: JAR Files and OAMCfgTool
» Establishing Trust with Oracle WebLogic Server
» Output LDIF Created Validate
» Fresh WebGate ProfileWebGate Not Installed Fresh WebGate Profile with Installed WebGate
» Setting Up the Login Form for the Identity Asserter and OAM 10g
» Testing Identity Assertion for SSO with OAM 10g
» Creating an Authentication Scheme for the Authenticator
» Authentication Rule Oracle Fusion Middleware Online Documentation Library
» OAM Authenticator Configuring Providers for the Authenticator in a WebLogic Domain
» Ensure that the parameter Control Flag is set to OPTIONAL initially.
» From the WebLogic Administration Console, go to Security Realms, myrealm,
» Configuring the Application Authentication Method for the Authenticator
» Mapping the Authenticated User to a Group in LDAP
» Testing the Oracle Access Manager Authenticator Implementation
» General Tab Creating an Policy Domain for Use with Oracle Web Services Manager
» Resources Tab Creating an Policy Domain for Use with Oracle Web Services Manager
» Authorization Rules Tab Creating an Policy Domain for Use with Oracle Web Services Manager
» General Tab Oracle Fusion Middleware Online Documentation Library
» Timing Conditions Oracle Fusion Middleware Online Documentation Library
» Actions Oracle Fusion Middleware Online Documentation Library
» Allow Access Oracle Fusion Middleware Online Documentation Library
» Configuring Oracle Web Services Manager Policies for Web Services
» OAM Identity Asserter Configuring Providers in a WebLogic Domain for Oracle Web Services Manager
» Click the Provider Specific tab and specify the following required settings
» About Using IPv6 Troubleshooting Tips for OAM Provider Deployments
» Apache Bridge Failure: Timed Out
» Authenticated User with Access Denied
» Browser Back Button Results in Error
» Client in Cluster with Load-Balanced WebGates
» Log in to Oracle Technology Network at:
» Locate the OAMCfgTool ZIP file with Access Manager Core Components
» Extract and copy oamcfgtool.jar to the computer hosting WebGate:
» Error 401: Unable to Access the Application Error 403: Unable to Access the Application
» JAAS Control Flag Click Access System Configuration, and then click AccessGate
» Oracle WebLogic Server Fails to Start
» Oracle ADF Integration and Cert Mode
» About Protected_JSessionId_Policy
» Consumption of Headers with OSSO Identity Asserter
» New Users of the OSSO Identity Asserter
» Oracle WebLogic Server 10.3.1+ Oracle Fusion Middleware Online Documentation Library
» Click Security Realms, Default Realm Name, Providers.
» Check whether the server is being hit without first going through authentication
» URL Rewriting and JSESSIONID
» About mod_osso, OSSO Cookies, and Directives
» About Using IPv6 Troubleshooting for an OSSO Identity Asserter Deployment
» Introduction Oracle Fusion Middleware Online Documentation Library
» Terminology Oracle Fusion Middleware Online Documentation Library
» OID for Identity and Policy Stores
» OAM and OSSO for User Authentication and Web SSO
» OIM for User and Role Provisioning
» OPSS for User and Role Profiling
» OAPM for Application Policy Management
» OPSS for Cryptography Oracle Identity and Access Management Suite
» Development Phase Security Life Cycle of an Application
» Summary of Tasks per Participant per Phase
» Oracle Platform Security Services
» Use Case 1 - Java EE Application
» Credentials Required Security Features
» Authentication Required Security Features
» Authorization Required Security Features
» Container-Based Authentication Integrating Authentication
» Oracle WebLogic Server Authentication Providers
» Functional Security Integrating Authorization
» Functional Security with ADF
» Cryptography Integrating the Credential Store
» The Development Cycle OPSS for Developers
» Challenges of Securing Java Applications
» Meeting the Challenges with Oracle Platform Security Services OPSS Architecture
» The LoginService API OPSS APIs
» The User and Role API JAAS Authorization and the JpsAuth.checkPermission API
» Java EE Application using OPSS APIs Authenticating with OPSS APIs
» Programmatic Authorization Credential Store Framework
» User and Role Common Uses of OPSS
» Oracle ADF Authorization Common Uses of OPSS
» About Oracle ADF Using OPSS with Oracle Application Development Framework
» The Oracle ADF Development Life Cycle
» Using the Oracle Security Developer Tools
» Using OPSS Outside Oracle JDeveloperOracle ADF
» Introduction to Authorization Authorization Overview
» The Resource Catalog The JAASOPSS Authorization Model
» Managing Policies The JAASOPSS Authorization Model
» The Class ResourcePermission The JAASOPSS Authorization Model
» Interceptor Configuration Syntax Configuring the Servlet Filter and the EJB Interceptor
» Summary of Filter and Interceptor Parameters
» Configuring the Application Stripe for Application MBeans
» The Security Policy Model Choosing the Appropriate Class for Enterprise Groups and Users
» Packaging Policies with Application
» Packaging Credentials with Application
» Parameters Controlling Policy Migration
» Policy Parameter Configuration According to Behavior
» Using a Wallet-Based Credential Store
» Parameters Controlling Credential Migration
» Credential Parameter Configuration According to Behavior
» Supported Permission Classes Configuring Applications to Use OPSS
» Specifying Bootstrap Credentials Manually
» Migrating Identities with migrateSecurityStore
» Example of Configuration File jps-config.xml
» Links to Authentication Topics for Java EE Applications
» The Identity Store Authentication for Java SE Applications
» Configuring an LDAP Identity Store in Java SE Applications
» Supported Login Modules for Java SE Applications
» Using the OPSS API LoginService in Java SE Applications
» Supported Services The OPSS Java SE Client
» Configuration Examples The OPSS Java SE Client
» Configuring File-Based Policy and Credential Stores
» Configuring LDAP-Based Policy and Credential Stores
» Configuring DB-Based OPSS Security Stores
» Unsupported Methods for File-Based Policy Stores
» About the Credential Store Framework API
» Guidelines for Granting Permissions Permissions Grant Example 1
» Overview of Application Development with CSF Guidelines for the Map Name
» Code for CSF Operations Example 1: Java SE Application with Wallet Store
» Example 2: Java EE Application with Wallet Store
» Example 3: Java EE Application with LDAP Store
» Configuring the Credential Store Best Practices
» User and Role API and the Oracle WebLogic Server Authenticators
» Summary of Roles and Classes
» Understanding Service Providers Working with Service Providers
» Selecting the Provider Working with Service Providers
» Creating the Provider Instance
» Properties for Provider Configuration
» Configuring the Provider when Creating a Factory Instance
» Configuring the Provider when Creating a Store Instance
» Runtime Configuration Working with Service Providers
» Specifying Search Parameters Searching the Repository
» Using Search Filters Searching the Repository
» Handling Special Characters when Creating Identities Creating an Identity
» Example 1: Searching for Users
» Example 2: User Management in an Oracle Internet Directory Store
» Example 3: User Management in a Microsoft Active Directory Store
» Out-of-the-box Support for SSL
» Customizing SSL Support for the User and Role API
» User Authentication The User and Role API Reference
» SPI Overview Types of User and Role Providers
» Developing a Read-Only Provider
» Policy-Related Scripts Oracle Fusion Middleware Online Documentation Library
» Credential-Related Scripts Oracle Fusion Middleware Online Documentation Library
Show more